[Git][security-tracker-team/security-tracker][master] CVE-2019-832{0,1,2,3,4,5}/ruby2.5 fixed in unstable

Salvatore Bonaccorso carnil at debian.org
Tue Mar 26 21:38:29 GMT 2019


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b481f4a3 by Salvatore Bonaccorso at 2019-03-26T21:37:45Z
CVE-2019-832{0,1,2,3,4,5}/ruby2.5 fixed in unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4985,7 +4985,7 @@ CVE-2019-8326
 	RESERVED
 CVE-2019-8325 [Escape sequence injection vulnerability in errors]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>
@@ -4996,7 +4996,7 @@ CVE-2019-8325 [Escape sequence injection vulnerability in errors]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8324 [Installing a malicious gem may lead to arbitrary code execution]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>
@@ -5007,7 +5007,7 @@ CVE-2019-8324 [Installing a malicious gem may lead to arbitrary code execution]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8323 [Escape sequence injection vulnerability in API response handling]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>
@@ -5018,7 +5018,7 @@ CVE-2019-8323 [Escape sequence injection vulnerability in API response handling]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8322 [Escape sequence injection vulnerability in gem owner]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>
@@ -5029,7 +5029,7 @@ CVE-2019-8322 [Escape sequence injection vulnerability in gem owner]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8321 [Escape sequence injection vulnerability in verbose]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>
@@ -5040,7 +5040,7 @@ CVE-2019-8321 [Escape sequence injection vulnerability in verbose]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8320 [Delete directory using symlink when decompressing tar]
 	RESERVED
-	- ruby2.5 <unfixed>
+	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
 	- rubygems <removed>



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b481f4a3b12b8dd3bcbd4db0521fe8ac0b69d0f1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b481f4a3b12b8dd3bcbd4db0521fe8ac0b69d0f1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190326/ec927af9/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list